- UpvoteDownvoteShare Job
- Suggest Revision
3 - 5 years information security programexperience to include incident management vulnerability management, data-loss prevention,endpoint protection, security information event management (SIEM), intrusiondetection systems, intrusion prevention systems, malware analysis, and networksituational awareness.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead and influence change management efforts related to risk and opportunities that are specified by the Enterprise Project Management Office, working with peers and senior leadership across Westinghouse and key project personnel within the business unit; Communicate and ensure compliance with risk policies and processes.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform research, data collection, quality assurance, analysis and problem solving (Python, SQL, Informatica DQ, Unity Catalog in Databricks, Triage & remediate data quality, Data integrity or data management issues.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate and communicate with Information Security, Privacy, Procurement, Audit, Compliance, and other teams across the Enterprise to align risk management objectives, practices and procedures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform security functions such as vulnerability scanning, penetration testing, and creation of backups for critical data in accordance with JSIG and Risk Management Framework (RMF.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Assessing and effectively managing all of the risks associated with their business objectives and activities to ensure they adhere to and support PNC's Enterprise Risk Management Framework.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Partner with Enterprise Risk Management to ensure tasks such as End User Computing, SOC report monitoring, and Human Resources risk/control documentation and processing are performed accurately and timely.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We roll up our sleeves to transform business, revolutionize approaches, satisfy customers, and change the game through Architecture, Cybersecurity, Digital Transformation, Enterprise Application and Risk functions.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Actuarial Science, Business Administration/Management, Commerce, Computer and Information Science, Computer Engineering, Computer Programming, Data Processing/Analytics/Science, Economics, Engineering, Engineering and Business, Finance, Information Technology, Management Information Systems, Mathematics, Mechanical Engineering, Operations Management/Research, Risk Management, Software App, Statistics.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Risk management experience, including performing assessments and audits, designing information security controls and processes, and evaluating and prioritizing risk. Strong working knowledge of technical systems, applications, security services/tools (e.g., EDR, MDR, SIEM, Vulnerability Scanning, Email Security, Backup/DR, MDM), Firewalls, Networking, Data Security, IAM/SSO, etc., to support advisory consulting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with various functions across the organization, such as EY’s Information Security, IT Risk Management, members of the business and Service Line Quality, and Talent, to design and implement controls in order to protection confidential/personal information.
$69,200 - $121,800 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
ResponsibilitiesLead a multi-disciplinary team (of both direct reports and matrixed roles) to sustaining and evolving its charter Build partnerships across the enterprise globally and domestically, including product management, Data Science, marketing, sales, operations, finance, legal, content development and customer experience.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 3 years of directly related experience in IT security or risk management. - Experience working in Third Party Risk Management. - One or more of the following certifications: Certificate of Cloud Security Knowledge (CCSK), Certificate of Cloud Auditing Knowledge (CCAK), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Security Professional (CISSP), etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Were seeking a future team member for the role of Vice President, Data Management and Design to join our Capabilities & Data Design team. Vice President II, Data Management and Design.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong cloud migration and data management skills with an emphasis on data privacy and security. 5+ years of experience in implementing backup and disaster recovery solutions for Azure, following industry best practices and change management policies.
ExpandApply NowActive JobUpdated 27 days ago
data security management enterprise risk change jobs in Pittsburgh, PA
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.